A deep technical analysis of 811331 European websites. TLS configuration, email authentication, security headers, and DNS security — measured, not estimated.
86.6%
TLS 1.3
9.2%
DMARC reject
28%
HSTS
11%
CSP
16%
DNSSEC
77%
HTTPS
0%
IPv6 ready
1%
HTTP/3
2%
NS redundancy
0%
sec.txt CRA
1%
Mixed content
1%
CSP reporting
More reports
810550 sites scanned
TLS encrypts data in transit. TLS 1.3 is the current standard — older versions have known vulnerabilities. Required by GDPR Art. 32 (encryption of personal data), NIS2 Art. 21 (state of the art security measures), and PCI DSS 4.0 (TLS 1.2+ mandatory since March 2025).
13%
Forward Secrecy
100%
Certificate Transparency
34%
OCSP Stapling
32%
Wildcard Certs
0%
Deprecated TLS
858012 sites scanned
HTTP security headers instruct browsers to enable protections like XSS filtering, clickjacking prevention, and content type enforcement. OWASP recommends all six headers. NIS2 Art. 21 and ISO 27001 A.8.9 require appropriate technical measures — missing headers indicate gaps.
77%
HTTPS Redirect
5%
HSTS Preload Ready
3%
security.txt
36%
Open CORS
2%
HSTS < 6 months
1%
Unsafe Referrer-Policy
2%
COOP Enabled
5%
Server Misconfigs
839793 sites scanned
SPF, DKIM, and DMARC prevent email spoofing and phishing. Without DMARC enforcement, attackers can send emails that appear to come from your domain. Required by NIS2 Art. 21 (supply chain security), DORA Art. 9 (ICT risk management), and BSI IT-Grundschutz APP.5.3.
75%
SPF
31%
DKIM
46%
DMARC
55%
STARTTLS
54%
Modern SMTP TLS
0%
Blacklisted
Percentage of sites without effective DMARC policy (spoofable via email)
858734 sites scanned
DNS security features protect against cache poisoning, domain hijacking, and man-in-the-middle attacks. DNSSEC is recommended by ENISA and required under NIS2 for essential entities. CAA prevents unauthorized certificate issuance (RFC 8659). MTA-STS enforces TLS for inbound email.
Zone Transfer (AXFR) open on 1% of domains — full DNS zone data is publicly accessible.
How this data was collected and what it represents.
All data is collected through automated, non-intrusive scans of publicly accessible websites. No login credentials are used, no forms are submitted, and no private data is accessed.
Sites are scanned across multiple dimensions: HTTP headers, TLS certificates, DNS records, and email authentication (SPF/DKIM/DMARC). Privacy, accessibility, and technology data are available in dedicated reports.
No individual sites are named. All statistics are aggregated and anonymised. Regulatory references indicate which requirements relate to each finding — they do not assert non-compliance of any specific organisation.
Run a free security scan and see how you compare — TLS, headers, email, DNS — in 30 seconds, no account needed.
Based on automated scans of 811331 European websites. Updated continuously.